G4LB1T / LazySView external linksLinks
PoC malware built by copy-paste
☆25Apr 10, 2021Updated 4 years ago
Alternatives and similar repositories for LazyS
Users that are interested in LazyS are comparing it to the libraries listed below
Sorting:
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆16Aug 11, 2023Updated 2 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆11Apr 18, 2017Updated 8 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 4 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- ☆26Jan 10, 2019Updated 7 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- ☆15Aug 23, 2020Updated 5 years ago
- Using macros in order to encrypt strings during compilation time.☆15Mar 28, 2019Updated 6 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 10 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- A Python program that scans RAM.☆40Jan 10, 2015Updated 11 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Sep 7, 2019Updated 6 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated last year
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 7 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆66Feb 11, 2018Updated 8 years ago
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Feb 10, 2017Updated 9 years ago
- PowerShell Reverse HTTPs Shell☆29Nov 14, 2014Updated 11 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- C# AV bypass jank☆33Feb 9, 2021Updated 5 years ago
- Скрытие Win API☆27Aug 14, 2019Updated 6 years ago
- ☆10Jan 27, 2026Updated 2 weeks ago
- Process Hollowing demonstration & explanation☆35Feb 25, 2021Updated 4 years ago
- Winhttpclient is an interface which packaged with WinHTTP API written in c.☆12Jan 22, 2023Updated 3 years ago
- just a bunch of vulnerable web pages for demo☆11Jun 6, 2019Updated 6 years ago
- Digideps: Managed by opg-org-infra & Terraform☆12Updated this week
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago